Information Security Consulting
Subject ISYS90070 (2011)
Note: This is an archived Handbook entry from 2011.
Credit Points: | 12.50 |
---|---|
Level: | 9 (Graduate/Postgraduate) |
Dates & Locations: | This subject is not offered in 2011. |
Time Commitment: | Contact Hours: 3 hours per week Total Time Commitment: 120 hours |
Prerequisites: | None |
Corequisites: | None |
Recommended Background Knowledge: | None |
Non Allowed Subjects: | None |
Core Participation Requirements: |
For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements for this entry. The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/ |
Contact
atif@unimelb.edu.auSubject Overview: | You will be introduced to a range of information security consulting services provided by industry. The subject will introduce information security issues in organizations such as security risk assessment, incident response and disaster recovery, knowledge leakage, systems and network security, and governance and culture. You will develop an appreciation for the kinds of consulting services that can be developed and marketed to industry in each of these areas. Consulting techniques in proposal writing, pricing, and marketing to prospective clients will also be discussed. |
---|---|
Objectives: | Upon completion of this subject, students should be able to: • Identify a range of opportunities for information security consulting in organizations • Develop and document a competitive business proposal to undertake information security consulting services inside an organization • Describe a high-level strategy for managing an organization’s information security issues • Appreciate the critical role of information security in organizations and the controls available for enforcement |
Assessment: | A group Seminar paper of 2,500 words (40%); a presentation in the last third of the semester (40%); contributions to seminar activities due throughout the semester (20%) |
Prescribed Texts: | None |
Recommended Texts: | A range of readings will be provided during the course, including current articles and reports. |
Breadth Options: | This subject is not available as a breadth subject. |
Fees Information: | Subject EFTSL, Level, Discipline & Census Date |
Related Course(s): |
Master of Information Systems Master of Information Systems Master of Information Systems |
Download PDF version.